Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (232)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 174 Next »

14%
10 Ways to Use Event-Driven Ansible
09.03.2023
Home »  News  » 
 
describes 10 ways you can apply Event-Driven Ansible for tasks related to networking, DevOps, and more, including: User request management Security automation Installation and provisioning
14%
CISA Warns of Widespread Exploitation of Known Confluence Vulnerability
18.10.2023
Home »  News  » 
 
Confluence administrator accounts,” and network administrators are urged to patch the flaw immediately. Read more at Decipher.            
14%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
if something bad occurs. Given that most enterprise networks have hundreds or thousands of networked information systems, vulnerability analysis and assessment by manual methods are virtually impossible
14%
Ubuntu Server 15.10
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
as resources are added. The LXD container hypervisor hosts Linux guests, providing image management, snapshots, live migration, Fan overlay networking for increasing the number of addressable Docker and LXD
14%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
Data sent on a journey across the Internet often takes different amounts of time to travel the same distance. This delay time, which a packet experiences on the network, comprises: transmission
14%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
The most common operating systems on the LAN are Windows, Linux, and Mac OS X. They all run IPv6 in parallel with IPv4. IPv6 is enabled and active by default, and the systems on the network communicate via
14%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
that another node can subsequently be installed by Ironic (Figure 1). Figure 1: The sample setup for this article includes three servers with two networks each
14%
Microsegmentation in the data center
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Chalong Tawan, 123RF.com
Microsegmentation breaks a network or data center into various segments to enhance its efficiency or security. The idea behind segmentation became an established technique once virtual local area
14%
On the CD
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
for manual network configuration; otherwise, the network will be configured with DHCP. At the end of the installation, the system is equipped with a user "sernet" that has no password (yet
14%
OpenStack workshop, part 2: OpenStack cloud installation
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Anatoly Terebenin, 123RF.com
as a node for the OpenStack network service, Quantum, and the third node is a classic hypervisor that houses the virtual machines in the environment. Required Packages Also in this article I assume you

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice